Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.801123
Kategorie:Buffer overflow
Titel:PHP '_gdGetColors()' Buffer Overflow Vulnerability
Zusammenfassung:PHP is prone to a buffer overflow vulnerability.
Beschreibung:Summary:
PHP is prone to a buffer overflow vulnerability.

Vulnerability Insight:
The flaw is due to error in '_gdGetColors' function in gd_gd.c which fails to
check certain colorsTotal structure member, whicn can be exploited to cause
buffer overflow or buffer over-read attacks via a crafted GD file.

Vulnerability Impact:
Successful exploitation could allow attackers to potentially compromise a
vulnerable system.

Affected Software/OS:
PHP version 5.2.x to 5.2.11 and 5.3.0 on Linux.

Solution:
Update to version 5.2.12, 5.3.1 or later.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-3546
36712
http://www.securityfocus.com/bid/36712
37069
http://secunia.com/advisories/37069
37080
http://secunia.com/advisories/37080
38055
http://secunia.com/advisories/38055
ADV-2009-2929
http://www.vupen.com/english/advisories/2009/2929
ADV-2009-2930
http://www.vupen.com/english/advisories/2009/2930
MDVSA-2009:285
http://www.mandriva.com/security/advisories?name=MDVSA-2009:285
RHSA-2010:0003
http://www.redhat.com/support/errata/RHSA-2010-0003.html
[oss-security] 20091015 Re: CVE Request -- PHP 5 - 5.2.11
http://marc.info/?l=oss-security&m=125562113503923&w=2
[oss-security] 20091120 Re: CVE request: php 5.3.1 update
http://www.openwall.com/lists/oss-security/2009/11/20/5
http://svn.php.net/viewvc?view=revision&revision=289557
oval:org.mitre.oval:def:11199
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11199
CopyrightCopyright (C) 2009 Greenbone Networks GmbH

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.